US6597663B1 - Technique for handling forwarding transients with link state routing protocol - Google Patents
Technique for handling forwarding transients with link state routing protocol Download PDFInfo
- Publication number
- US6597663B1 US6597663B1 US09/360,711 US36071199A US6597663B1 US 6597663 B1 US6597663 B1 US 6597663B1 US 36071199 A US36071199 A US 36071199A US 6597663 B1 US6597663 B1 US 6597663B1
- Authority
- US
- United States
- Prior art keywords
- hop
- count
- router
- forwarding
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000007246 mechanism Effects 0.000 claims abstract description 18
- 230000008859 change Effects 0.000 claims description 17
- 230000003190 augmentative effect Effects 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 4
- 238000001514 detection method Methods 0.000 abstract description 10
- 238000004891 communication Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 12
- 230000005540 biological transmission Effects 0.000 description 8
- 230000001052 transient effect Effects 0.000 description 8
- 230000008569 process Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000007723 transport mechanism Effects 0.000 description 3
- 239000006227 byproduct Substances 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 235000008694 Humulus lupulus Nutrition 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000001174 ascending effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/18—Loop-free operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/20—Hop count for routing purposes, e.g. TTL
Definitions
- This invention relates generally to computer networks and, more particularly, to the detection of routing transients in a computer network.
- Communication in a computer network involves the exchange of data between two or more entities interconnected by communication links and subnetworks.
- entities are typically software programs executing on hardware computer platforms, such as end stations and intermediate stations.
- An example of an intermediate station may be a switch or router which interconnects the communication links and subnetworks to enable transmission of data between the end stations.
- the stations typically communicate by exchanging discrete packets or frames of data according to predefined protocols.
- a protocol consists of a set of rules defining how the stations interact with each other.
- Most networks are typically organized as a series of hardware and software levels or “layers” within each station. These layers interact to format data for transfer between, e.g., a source station and a destination station communicating over the network. Specifically, predetermined services are performed on the data as it passes through each layer and the layers communicate with each other by means of the predefined protocols. This layered design permits each layer to offer selected services to other layers using a standardized interface that shields those layers from the details of actual implementation of the services.
- FIG. 1 illustrates a schematic block diagram of prior art Internet protocol stacks 125 and 175 used to transmit data between a source station 110 and a destination station 150 , respectively, of a network 100 .
- the stacks 125 and 175 are physically connected through a communications channel 180 at the network interface layers 120 and 160 .
- the protocol stack 125 will be described.
- the lower layers of the communications stack provide internetworking services and the upper layers, which are the users of these services, collectively provide common network application services.
- the transport layer 114 serves as the boundary between the network-specific elements and the application-specific elements.
- the transport layer's fundamental service is to move a user's data from its source to its destination over a communication path using the internetwork subsystem.
- the application layer 112 provides services suitable for the different types of applications using the network.
- the lower network interface layer 120 of the Internet architecture addresses protocols that occupy physical and datalink sublayers of layer 120 .
- the physical layer 126 is concerned with the actual transmission of signals across the communication channel and the datalink layer is responsible for transmission of data from one station to another.
- the primary network layer protocol of the Internet architecture is the Internet protocol (IP) contained within the internetwork layer 116 .
- IP is primarily a connectionless network protocol that relies on transport protocols for end-to-end reliability.
- An example of such a reliable transport mechanism is the transmission control protocol (TCP) contained within the transport layer 114 .
- Data transmission over the network 100 therefore consists of generating data in, e.g., sending process 104 executing on the source station 110 , passing that data to the application layer 112 and down through the layers of the protocol stack 125 , where the data are sequentially formatted as a frame for delivery onto the channel 180 as bits. Those frame bits are then transmitted over an established connection of channel 180 to the protocol stack 175 of the destination station 150 where they are passed up that stack to a receiving process 174 . Data flow is schematically illustrated by solid arrows.
- each layer is programmed as though such transmission were horizontal. That is, each layer in the source station 110 is programmed to transmit data to its corresponding layer in the destination station 150 , as schematically shown by dotted arrows. To achieve this effect, each layer of the protocol stack 125 in the source station 110 typically adds information (in the form of a header field) to the data frame generated by the sending process as the frame descends the stack. At the destination station 150 , the various encapsulated headers are stripped off one-by-one as the frame propagates up the layers of the stack 175 until it arrives at the receiving process.
- each layer of the protocol stack offers selected services to other layers; one such service is a connectionless service.
- This network service is generally implemented by a network layer protocol, an aspect of which involves the routing of packets from the source station to the destination station.
- this aspect of the internetwork layer concerns the algorithms and protocols used by routers when cooperating to calculate paths through a network topology.
- a routing algorithm is that portion of the network layer software responsible for determining an output communication link (i.e., an egress) over which an incoming packet should be transmitted.
- An example of a conventional routing algorithm is the Dijkstra algorithm and an example of a conventional network layer routing protocol is a link state routing protocol.
- each router constructs a link state packet (LSP) comprising information, such as a list of neighboring nodes adjacent to the router, sufficient to generate a complete map of the topology of the network.
- LSP link state packet
- the LSP is then forwarded to all other routers of the network over, e.g., a plurality of interconnected local area networks (LANs).
- LANs local area networks
- Each of these other routers stores only the most recently received LSP from the forwarding router in its LSP database.
- the routers may compute shortest paths to destination stations using a conventional routing algorithm; the computed paths are then stored in forwarding tables of the routers.
- link state routing protocols are the intermediate system to intermediate system (IS-IS) protocol defined by the International Standards Organization (ISO), the open shortest path first (OSPF) protocol defined by the Internet protocol (IP) community and the NetWare link services protocol (NLSP) defined by Novell, Inc.
- ISO International Standards Organization
- OSPF open shortest path first
- IP Internet protocol
- NLSP NetWare link services protocol
- transient i.e., temporary
- Routing transients typically arise when there is a change in the topology of a network. For example in response to a network topology change, each router updates its routing information and re-calculates shortest paths between the router and a destination station. This newly updated information is then transmitted to the other routers in the network. While the other routers propagate the updated information throughout the network and re-calculate their forwarding tables, there is a possibility that routers possessing inconsistent routing information may forward packets back to a previous sender of the packets, thus creating forwarding loops.
- the present invention is directed to an approach that enables detection of the occurrence of forwarding loops.
- each packet may carry hop-count (e.g., time-to-live) information in a conventional network layer header of the packet.
- hop-count e.g., time-to-live
- each ISR in a VC establishment path appends its own unique ISR ID to each establishment message it forwards. In this way, an ISR is able to determine the path a message has traversed and can ensure that no loops are formed. Further, if an ISR modifies or deletes an egress due to an IP route change, the ISR must unsplice any established upstream VC from the downstream VC. Such unsplicing forces inbound traffic to be forwarded at the IP network layer so that transient IP routing loops cannot produce VC loops.
- a switch uses a received LSP to compute a forwarding table and informs neighboring switches of a routing change.
- the switch discards subsequent packets whose path would be affected by the routing change. Discarding of packets continues until the switch receives notification from each adjacent switch affected by the routing change that all affected routing paths have been re-calculated and the forwarding table of each affected switch has been updated. While adjacent switches may temporarily contain inconsistent LSP databases and possibly inconsistent forwarding tables, looping of data packets is prevented.
- the objective of Soloway is to essentially synchronize LSP databases across the network and data packets are discarded until that objective is achieved.
- the mechanism in Soloway by which a switch informs the neighboring switches of the routing change, and by which the switch receives notification of those switches' affected by the routing change, is a Ready Announcement.
- the Ready Announcement is substantially a LSP that is modified to include an announcement bit which, when asserted true, indicates to all receivers that the Ready Announcement has been used to re-compute a forwarding table of the sending switch. Distribution of a modified LSP over the network results in relatively “slow” convergence of the patent's objective; that is, processing of the Ready Announcement consumes substantial time and overhead to determine inconsistencies of LSP databases.
- the invention comprises a technique for efficiently detecting inconsistencies in forwarding databases of a router and its neighbor during routing transients in a computer network.
- the technique enables is the router to detect when its view of a computed path to a destination station is inconsistent (in a way that may indicate potential transient forwarding loops) with the view of its neighbor along that path.
- the router Upon detecting such an inconsistent state, invokes one of a plurality of forwarding mechanisms with respect to a packet intended for the destination station to either suppress forwarding loops that may arise during the transients or to limit the amount of network resources such loops may consume.
- the novel detection technique comprises a control component and a forwarding component.
- each of the router and neighbor compute a shortest path and hop-count parameter to the destination, and store the computed path and parameter in their respective augmented forwarding information databases (FIB′).
- FIB′ augmented forwarding information databases
- the neighbor Upon detecting a change in the hop-count parameter stored in the FIB′, the neighbor sends an update message to all of its neighbors, including the router that views the neighbor as its next-hop (NH) neighbor with respect to the destination.
- the update message contains a tuple comprising an address prefix associated with the computed path to the destination station and the hop-count parameter associated with that path to the destination.
- the hop-count parameter contained in the update message is a value representing the number of routers between the router originating the message and the last router within the same routing hierarchy (e.g., OSPF area) as the originating router along the computed path to the destination station (where the path is determined by the originating router).
- the router In response to receiving the update message from its NH neighbor, the router (i) either discards all packets intended for the destination that are queued for transmission to the NH neighbor, or decrements a time-to-live or lifetime entry of an conventional network layer header of each packet and (ii) returns an acknowledgement message comprising the same tuple contained in the update message.
- the router compares the NH view of the computed path, i.e., the hop-count value contained in the update message received from the NH neighbor, with its own view, i.e., the hop-count value contained in its FIB′. In accordance with another aspect of the invention, if the hop-count value in the update message is less than the FIB′ hop-count value, the router's view of the path is consistent with the NH neighbor's view and the packet may be sent to the destination station.
- the router's view of the computed path is inconsistent with its NH neighbor's view.
- the forwarding component of the detection technique is invoked.
- the packet may be discarded by the router or, alternatively, forwarded along the path but only after decrementing the time-to-live or lifetime entry of the conventional network layer header of the packet.
- the inventive technique either completely eliminates or contains the amount of looping that occurs during routing transients.
- the invention may operate in an environment where decrementing time-to-live (hop-count) on every packet may be undesirable or infeasible.
- FIG. 1 is a schematic block diagram of prior art protocol stacks used to transmit data between stations of a computer network
- FIG. 2 is a block diagram of a network system including a collection of computer networks connected to a plurality of stations;
- FIG. 3 is a flowchart illustrating a control sequence of a novel detection technique in accordance with the invention
- FIG. 4 is a schematic diagram of an update message in accordance with the invention.
- FIG. 5 is a schematic diagram of an acknowledgement message in accordance with the invention.
- FIG. 6 is a flowchart illustrating a forwarding sequence of the novel detection technique according to the invention.
- FIGS. 7A and 7B are schematic block diagrams of conventional network layer headers that may operate advantageously with the present invention.
- FIG. 2 is a block diagram of a network system 200 comprising a collection of computer networks connected to a plurality of stations.
- the stations are typically computers comprising source station 202 , destination station 204 and intermediate stations 206 - 210 , which are preferably routers (R).
- the computer networks included within system 200 are preferably local area networks (LANs) interconnected by the routers, although the networks may comprise other communication links, such as wide area networks. Communication among the stations coupled to the LANs is typically effected by exchanging discrete data “packets” among the stations.
- the routers facilitate the flow of these data packets throughout the system by routing the packets to the proper receiving stations.
- Each router typically comprises a plurality of interconnected elements, such as a processor 212 , a memory 214 and an input/output (I/O) adapter 216 .
- the memory 214 may comprise storage locations addressable by the processor and adapter for storing software programs and data structures associated with the inventive detection technique.
- the memory may be farther organized as a forwarding information database (FIB) 220 for storing routing information and computed parameters described herein although, in an alternate embodiment, a disk (not shown) may be coupled to the I/O adapter and configured to function as the database.
- FIB forwarding information database
- the processor may further comprise processing elements or logic for executing the software programs and manipulating the data structures and packets according to the techniques described herein.
- An operating system portions of which are typically resident in memory and executed by the processor, functionally organizes the router by, inter alia, invoking network operations in support of software processes executing on the router. It will be apparent to those skilled in the art that other processor and memory means, including various computer readable media, may be used for storing and executing program instructions pertaining to the described techniques.
- source station 202 transmits a packet over a LAN, such as LAN 205
- the packet is sent to all stations on that LAN. If the intended recipient of the packet is connected to LAN 215 , the packet is routed through routers 206 - 210 onto LAN 215 .
- the packet contains two destination addresses: the address of the final destination station 204 and the address of the next station along the route. The final destination address remains constant as the packet traverses the networks, while the next destination address changes as the packet moves from station to station along the route through the networks.
- a key function of a router is determining the next station to which the packet is sent; this routing function is preferably performed by network layer (such as internetwork layer 116 of FIG. 1) of a protocol stack within each station.
- This aspect of the network layer concerns the algorithms and protocols used by routers when cooperating to calculate paths through a network topology.
- the routers typically execute routing algorithms to decide over which communication links incoming packets should be transmitted.
- a type of network layer routing protocol commonly employed by routers is a link state routing protocol.
- link state routing algorithms in conjunction with hop-by-hop forwarding do not generally prevent the creation of temporary forwarding loops during routing transients in a network.
- routers possessing inconsistent routing information in their forwarding databases may forward packets back to a previous sender of the packets during routing transients, thus creating forwarding loops.
- a technique for detecting inconsistencies in FIBs of a router (such router 210 ) and its neighbor 206 during routing transients in a computer network.
- the neighbor 206 is preferably a next-hop (NH) neighbor as viewed by the router 210 with respect to a particular destination, such as destination station 204 .
- the inventive technique enables the router 210 to detect when its view of a computed path to destination station 204 is inconsistent with the view of its NH neighbor 206 along that path.
- the router invokes one of a plurality of forwarding mechanisms with respect to a packet intended for the destination station in an attempt to either suppress forwarding loops that may arise during the transients or limit the amount of resources such loops consume.
- FIGS. 3 and 6 are flowcharts illustrating the sequence of steps comprising the novel detection technique.
- the technique is embodied as a network layer protocol comprising a control mechanism component 300 and a forwarding mechanism component 600 .
- the control mechanism is based on the ability of each router to compute the shortest path and/or number of hops to a destination station when executing a link state algorithm.
- the control mechanism sequence 300 starts at Step 302 and proceeds to Step 304 where each router computes a shortest path (route) to the destination 204 by executing a routing algorithm, such as the conventional Dijkstra algorithm.
- a routing algorithm such as the conventional Dijkstra algorithm.
- By-products of the Dijkstra algorithm include determinations of parameters such as the next hop, i.e., intermediate router, and the hop-count to the destination, i.e., hop-count (D).
- the routers install the computed path, together with these parameters, in their FIBs 220 .
- Each router then constructs an “augmented” FIB (denoted FIB′ 230 in FIG. 2) by manipulating the contents of the FIB 220 to include the next-hop and hop-count (D) parameters (Step 308 ); these parameters are preferably stored in the FIB′ at a location referenced by an address prefix associated with the path to the destination.
- the address prefix is that portion of the destination address typically used by network layer protocols performing routing functions (at the same routing level of a network) to make next-hop determinations.
- the routing information exchanged by (peer) routers typically includes this destination address prefix, although other encoding methods for a set of reachable destinations could be used as well (e.g., explicit enumeration or ranges).
- each router checks the FIB′ to determine whether there is a change that affects the hop-count (D) parameter. Although the hop-count typically changes as a result of a change in network topology, not all changes in topology result in a change in hop-count. If there is no change affecting the hop-count (D), each router waits for a change in Step 312 and the sequence loops-back to Step 310 ; otherwise, if there is a change to the parameter, that router, e.g., NH neighbor 206 , generates an update message in Step 314 and transmits that message to all-of its neighbors, including router 210 .
- D hop-count
- FIG. 4 is a schematic diagram of the format of the update message 400 comprising a type field 402 identifying the type of message, an address field 404 of the destination station and a hop-count field 406 .
- the latter two fields contain a tuple comprising an address prefix of the destination station (in field 404 ) and a hop-count (D) [UPDATE] value (in field 406 ).
- the hop-count (D) [UPDATE] value in field 406 of the update message 400 represents the number of routers between the router originating the message and the last router within the same routing hierarchy (e.g., OSPF area) as the originating router along the computed path to the destination station (where the path is determined by the originating router).
- the router 210 Upon receiving the update message 400 from the NH neighbor 206 , the router 210 (i) either discards all packets intended for the destination that are queued for transmission to the NH neighbor 206 , or decrements a time-to-live or lifetime entry of an conventional network layer header of each packet and (ii) acknowledges receipt of the update message by returning an acknowledgement message to the NH neighbor 206 in Step 316 .
- the protocol for exchanging update and acknowledgement messages described herein is built upon a reliable transport mechanism, such as TCP, to ensure reliable exchanges between the router and its neighbor.
- FIG. 5 is a schematic block diagram of the format of the acknowledgement message 500 which is substantially similar to the update message 400 . That is, the acknowledgement message 500 comprises a type field 502 identifying the type of message, an address field 504 containing the address prefix of the destination station and a hop-count field 506 . The contents of the hop-count field 506 comprise a hop-count (D) [ACK] value that is identical to the hop-count (D) [UPDATE] value stored in field 406 .
- D hop-count
- the router 210 compares the NH view of the computed path, i.e., the hop-count (D) [UPDATE] value contained in the NH neighbor's update message, with its own view, i.e., the hop-count (D) [FIB′] value contained in its FIB′, in Step 318 .
- a determination is made as to whether the hop-count (D) [UPDATE] value is less than the hop-count (D) [FIB′] value in Step 320 . If so, the router's view of the path is consistent with the NH neighbor's view and the packet may be sent over the path to the destination station in Step 322 ; the sequence then ends in Step 324 .
- the router's view of the computed path is inconsistent with its NH neighbor's view (Step 326 ) and the forwarding component sequence of the detection technique is invoked.
- the forwarding sequence 600 starts at Step 602 and proceeds to Step 604 where a forwarding mechanism is selected.
- the packet may be discarded by the router in Step 606 ; this forces the sender to retransmit the packet because of the underlying reliable transport mechanism.
- the packet may be forwarded over the path to the destination in Step 610 but only after decrementing a time-to-live or lifetime entry of a conventional network layer header of the packet (Step 608 ). In either case, the sequence then ends in Step 612 .
- These alternative forwarding mechanisms are preferably invoked by the router for as long as the database inconsistency persists, thus avoiding persistent looping during the transients.
- FIGS. 7A-7B are schematic block diagrams of conventional network layer headers that may operate advantageously with the present invention.
- FIG. 7A is a diagram of the Internet protocol (IP) network layer header 700 having a time-to-live field 702
- FIG. 7B is a diagram of the connectionless network layer protocol (CLNP) header 750 having a lifetime field 752 .
- the network layer header may comprise the Internet Packet Exchange (IPX) protocol header having a field similar to the time-to-live field 702 .
- IPX Internet Packet Exchange
- the contents of the fields 702 and 752 are modifiable by the routers; in particular, the contents of these fields are typically set to some initial value by the source station and are thereafter decremented by the routers until they reach zero (0), at which point the packet is discarded. Thus if the packet is caught in a forwarding loop encompassing the routers, the packet will eventually be discarded to suppress the loop.
- the router 210 is considered in a transient state (from the point of view of the NH neighbor 206 and destination 204 ) from the moment at which the NH neighbor 206 installs a new path to the destination in its FIB until the NH neighbor 206 receives and processes an acknowledgement from the router 210 indicating that the update message was received and processed. If the NH neighbor 206 changes its path to the destination station 204 , the neighbor discards all packets destined to the destination or decrements a time-to-live or lifetime entry of a network layer header if the packets were received from the router 210 when in a transient state.
- the inventive technique does not ensure that packets do not traverse through a non-shortest path route; the technique only constrains the length (hop-count) of such a route.
- An advantage of the inventive technique is that it enables limiting of the amount of resources that could be consumed during routing transients without requiring decrementing time-to-live (hop-count) on every packet.
- the invention may further operate in an environment where decrementing time-to-live (hop-count) may be undesirable or infeasible.
- the hop-count parameter contained in the novel update and acknowledgement messages may be substituted with an entire path parameter.
- the entire path parameter, i.e., path (D) is also a by-product of the Dijkstra algorithm and includes identification (ID) of all routers in the computed path between the either the router and destination or the neighbor and destination.
- Step 318 for this alternate embodiment comprises the router 210 comparing the path (D) contents contained in the update message with the path (D) contents contained in its FIB′. A determination is then made as to whether the path (D) of the FIB′ is equal to the path (D) of the update message minus the NH neighbor's ID in Step 320 . If so, the router's view of the path is consistent with the NH neighbor's view and the packet may be sent to the destination station in Step 322 . Otherwise, the views are inconsistent (Step 324 ) and the forwarding component sequence 600 (FIG. 6) is invoked.
Abstract
A detection technique detects inconsistencies in forwarding databases of a router and its neighbor, i.e., a next-hop router, during routing transients in a computer network. The technique enables the router to detect when its view of a computed path to a destination station is inconsistent with the view of its neighbor along that path. Upon detecting such an inconsistent state, the router invokes one of a plurality of forwarding mechanisms with respect to a packet intended for the destination station in an attempt to suppress forwarding loops that may arise during the transients.
Description
This is a continuation of Ser. No. 08/810,083 U.S. Pat. No. 5,964,841, filed Mar. 3, 1997, issued on Oct. 12, 1999.
This invention relates generally to computer networks and, more particularly, to the detection of routing transients in a computer network.
Communication in a computer network involves the exchange of data between two or more entities interconnected by communication links and subnetworks. These entities are typically software programs executing on hardware computer platforms, such as end stations and intermediate stations. An example of an intermediate station may be a switch or router which interconnects the communication links and subnetworks to enable transmission of data between the end stations. The stations typically communicate by exchanging discrete packets or frames of data according to predefined protocols. In this context, a protocol consists of a set of rules defining how the stations interact with each other.
Most networks are typically organized as a series of hardware and software levels or “layers” within each station. These layers interact to format data for transfer between, e.g., a source station and a destination station communicating over the network. Specifically, predetermined services are performed on the data as it passes through each layer and the layers communicate with each other by means of the predefined protocols. This layered design permits each layer to offer selected services to other layers using a standardized interface that shields those layers from the details of actual implementation of the services.
Modern communications architectures are organized as such layered designs. The Internet communications architecture is an example of a layered architecture represented by four layers which are termed, in ascending interfacing order, the network interface, internetwork, transport and application layers. These layers are arranged to form a protocol stack in each communicating node of the network. FIG. 1 illustrates a schematic block diagram of prior art Internet protocol stacks 125 and 175 used to transmit data between a source station 110 and a destination station 150, respectively, of a network 100. As can be seen, the stacks 125 and 175 are physically connected through a communications channel 180 at the network interface layers 120 and 160. For ease of description, the protocol stack 125 will be described.
In general, the lower layers of the communications stack provide internetworking services and the upper layers, which are the users of these services, collectively provide common network application services. The transport layer 114 serves as the boundary between the network-specific elements and the application-specific elements. The transport layer's fundamental service is to move a user's data from its source to its destination over a communication path using the internetwork subsystem. The application layer 112 provides services suitable for the different types of applications using the network.
The lower network interface layer 120 of the Internet architecture addresses protocols that occupy physical and datalink sublayers of layer 120. The physical layer 126 is concerned with the actual transmission of signals across the communication channel and the datalink layer is responsible for transmission of data from one station to another. The primary network layer protocol of the Internet architecture is the Internet protocol (IP) contained within the internetwork layer 116. IP is primarily a connectionless network protocol that relies on transport protocols for end-to-end reliability. An example of such a reliable transport mechanism is the transmission control protocol (TCP) contained within the transport layer 114.
Data transmission over the network 100 therefore consists of generating data in, e.g., sending process 104 executing on the source station 110, passing that data to the application layer 112 and down through the layers of the protocol stack 125, where the data are sequentially formatted as a frame for delivery onto the channel 180 as bits. Those frame bits are then transmitted over an established connection of channel 180 to the protocol stack 175 of the destination station 150 where they are passed up that stack to a receiving process 174. Data flow is schematically illustrated by solid arrows.
Although actual data transmission occurs vertically through the stacks, each layer is programmed as though such transmission were horizontal. That is, each layer in the source station 110 is programmed to transmit data to its corresponding layer in the destination station 150, as schematically shown by dotted arrows. To achieve this effect, each layer of the protocol stack 125 in the source station 110 typically adds information (in the form of a header field) to the data frame generated by the sending process as the frame descends the stack. At the destination station 150, the various encapsulated headers are stripped off one-by-one as the frame propagates up the layers of the stack 175 until it arrives at the receiving process.
As noted, each layer of the protocol stack offers selected services to other layers; one such service is a connectionless service. This network service is generally implemented by a network layer protocol, an aspect of which involves the routing of packets from the source station to the destination station. In particular, this aspect of the internetwork layer concerns the algorithms and protocols used by routers when cooperating to calculate paths through a network topology. A routing algorithm is that portion of the network layer software responsible for determining an output communication link (i.e., an egress) over which an incoming packet should be transmitted. An example of a conventional routing algorithm is the Dijkstra algorithm and an example of a conventional network layer routing protocol is a link state routing protocol.
According to this latter protocol, each router constructs a link state packet (LSP) comprising information, such as a list of neighboring nodes adjacent to the router, sufficient to generate a complete map of the topology of the network. As defined herein, the term “neighbor” denotes a neighboring router. The LSP is then forwarded to all other routers of the network over, e.g., a plurality of interconnected local area networks (LANs). Each of these other routers stores only the most recently received LSP from the forwarding router in its LSP database. Armed with updated maps, the routers may compute shortest paths to destination stations using a conventional routing algorithm; the computed paths are then stored in forwarding tables of the routers. Examples of link state routing protocols are the intermediate system to intermediate system (IS-IS) protocol defined by the International Standards Organization (ISO), the open shortest path first (OSPF) protocol defined by the Internet protocol (IP) community and the NetWare link services protocol (NLSP) defined by Novell, Inc.
Use of link state routing in conjunction with hop-by-hop forwarding may result in formation of transient (i.e., temporary) forwarding loops. Routing transients typically arise when there is a change in the topology of a network. For example in response to a network topology change, each router updates its routing information and re-calculates shortest paths between the router and a destination station. This newly updated information is then transmitted to the other routers in the network. While the other routers propagate the updated information throughout the network and re-calculate their forwarding tables, there is a possibility that routers possessing inconsistent routing information may forward packets back to a previous sender of the packets, thus creating forwarding loops. The present invention is directed to an approach that enables detection of the occurrence of forwarding loops.
Conventional link state routing protocols, such as OSPF and IS-IS, generally do not provide mechanisms for suppressing such forwarding loops during routing transients. In order to limit the amount of network resources consumed by such transient forwarding loops, each packet may carry hop-count (e.g., time-to-live) information in a conventional network layer header of the packet. When a router forwards the packet, it decrements the hop-count information and when a router receives the packet with the hop-count information equal to zero, it discards the packet.
An approach that enables limiting of the amount of networking resources consumed by transient forwarding loops without relying on each router to decrement hop-count information is described in an Internet-Draft publication titled ARIS: Aggregate Route-Based IP Switching by Richard Woundy et al. of International Business Machines Corp, November 1996. This publication discloses a mechanism which uses conventional link state routing protocols as the basis for switching IP datagrams by the addition of the ARIS protocol that establishes switched paths through a network. The ARIS protocol guarantees that asynchronous transfer mode (ATM) virtual circuit (VC) loops are prevented even in the presence of transient IP routing loops by using an integrated switch router (ISR) identification (“ISR ID”) list.
Specifically, each ISR in a VC establishment path appends its own unique ISR ID to each establishment message it forwards. In this way, an ISR is able to determine the path a message has traversed and can ensure that no loops are formed. Further, if an ISR modifies or deletes an egress due to an IP route change, the ISR must unsplice any established upstream VC from the downstream VC. Such unsplicing forces inbound traffic to be forwarded at the IP network layer so that transient IP routing loops cannot produce VC loops.
Another approach directed to solving the problem of suppressing forwarding loops during routing transients is described in U.S. Pat. No. 5,265,092, titled Synchronization Mechanism for Link State Packet Routing by Stuart R. Soloway et al. This patent discloses a method of providing loop free and shortest path routing of data packets in a network of switches through modifications to known LSP routing protocols.
Specifically, a switch uses a received LSP to compute a forwarding table and informs neighboring switches of a routing change. The switch discards subsequent packets whose path would be affected by the routing change. Discarding of packets continues until the switch receives notification from each adjacent switch affected by the routing change that all affected routing paths have been re-calculated and the forwarding table of each affected switch has been updated. While adjacent switches may temporarily contain inconsistent LSP databases and possibly inconsistent forwarding tables, looping of data packets is prevented. Thus, the objective of Soloway is to essentially synchronize LSP databases across the network and data packets are discarded until that objective is achieved.
The mechanism in Soloway by which a switch informs the neighboring switches of the routing change, and by which the switch receives notification of those switches' affected by the routing change, is a Ready Announcement. The Ready Announcement is substantially a LSP that is modified to include an announcement bit which, when asserted true, indicates to all receivers that the Ready Announcement has been used to re-compute a forwarding table of the sending switch. Distribution of a modified LSP over the network results in relatively “slow” convergence of the patent's objective; that is, processing of the Ready Announcement consumes substantial time and overhead to determine inconsistencies of LSP databases.
The invention comprises a technique for efficiently detecting inconsistencies in forwarding databases of a router and its neighbor during routing transients in a computer network. Specifically, the technique enables is the router to detect when its view of a computed path to a destination station is inconsistent (in a way that may indicate potential transient forwarding loops) with the view of its neighbor along that path. Upon detecting such an inconsistent state, the router invokes one of a plurality of forwarding mechanisms with respect to a packet intended for the destination station to either suppress forwarding loops that may arise during the transients or to limit the amount of network resources such loops may consume.
In the illustrative embodiment, the novel detection technique comprises a control component and a forwarding component. During execution of the control component, each of the router and neighbor compute a shortest path and hop-count parameter to the destination, and store the computed path and parameter in their respective augmented forwarding information databases (FIB′). Upon detecting a change in the hop-count parameter stored in the FIB′, the neighbor sends an update message to all of its neighbors, including the router that views the neighbor as its next-hop (NH) neighbor with respect to the destination. In accordance with an aspect of the present invention, the update message contains a tuple comprising an address prefix associated with the computed path to the destination station and the hop-count parameter associated with that path to the destination. Notably, the hop-count parameter contained in the update message is a value representing the number of routers between the router originating the message and the last router within the same routing hierarchy (e.g., OSPF area) as the originating router along the computed path to the destination station (where the path is determined by the originating router).
In response to receiving the update message from its NH neighbor, the router (i) either discards all packets intended for the destination that are queued for transmission to the NH neighbor, or decrements a time-to-live or lifetime entry of an conventional network layer header of each packet and (ii) returns an acknowledgement message comprising the same tuple contained in the update message. The router then compares the NH view of the computed path, i.e., the hop-count value contained in the update message received from the NH neighbor, with its own view, i.e., the hop-count value contained in its FIB′. In accordance with another aspect of the invention, if the hop-count value in the update message is less than the FIB′ hop-count value, the router's view of the path is consistent with the NH neighbor's view and the packet may be sent to the destination station.
On the other hand, if the update message hop-count value is not less than the FIB′ hop-count value, the router's view of the computed path is inconsistent with its NH neighbor's view. As a result, the forwarding component of the detection technique is invoked. According to this aspect of the invention, the packet may be discarded by the router or, alternatively, forwarded along the path but only after decrementing the time-to-live or lifetime entry of the conventional network layer header of the packet. These alternatives are invoked by the router for as long as the database inconsistency persists, thus avoiding persistent looping during the transients.
Advantageously, the inventive technique either completely eliminates or contains the amount of looping that occurs during routing transients. In addition, the invention may operate in an environment where decrementing time-to-live (hop-count) on every packet may be undesirable or infeasible.
The above and further advantages of the invention may be better understood by referring to the following description in conjunction with the accompanying drawings in which like reference numbers indicate identical or functionally similar elements:
FIG. 1 is a schematic block diagram of prior art protocol stacks used to transmit data between stations of a computer network;
FIG. 2 is a block diagram of a network system including a collection of computer networks connected to a plurality of stations;
FIG. 3 is a flowchart illustrating a control sequence of a novel detection technique in accordance with the invention;
FIG. 4 is a schematic diagram of an update message in accordance with the invention;
FIG. 5 is a schematic diagram of an acknowledgement message in accordance with the invention;
FIG. 6 is a flowchart illustrating a forwarding sequence of the novel detection technique according to the invention; and
FIGS. 7A and 7B are schematic block diagrams of conventional network layer headers that may operate advantageously with the present invention.
FIG. 2 is a block diagram of a network system 200 comprising a collection of computer networks connected to a plurality of stations. The stations are typically computers comprising source station 202, destination station 204 and intermediate stations 206-210, which are preferably routers (R). The computer networks included within system 200 are preferably local area networks (LANs) interconnected by the routers, although the networks may comprise other communication links, such as wide area networks. Communication among the stations coupled to the LANs is typically effected by exchanging discrete data “packets” among the stations. The routers facilitate the flow of these data packets throughout the system by routing the packets to the proper receiving stations.
Each router typically comprises a plurality of interconnected elements, such as a processor 212, a memory 214 and an input/output (I/O) adapter 216. The memory 214 may comprise storage locations addressable by the processor and adapter for storing software programs and data structures associated with the inventive detection technique. The memory may be farther organized as a forwarding information database (FIB) 220 for storing routing information and computed parameters described herein although, in an alternate embodiment, a disk (not shown) may be coupled to the I/O adapter and configured to function as the database.
The processor may further comprise processing elements or logic for executing the software programs and manipulating the data structures and packets according to the techniques described herein. An operating system, portions of which are typically resident in memory and executed by the processor, functionally organizes the router by, inter alia, invoking network operations in support of software processes executing on the router. It will be apparent to those skilled in the art that other processor and memory means, including various computer readable media, may be used for storing and executing program instructions pertaining to the described techniques.
In general, when source station 202 transmits a packet over a LAN, such as LAN 205, the packet is sent to all stations on that LAN. If the intended recipient of the packet is connected to LAN 215, the packet is routed through routers 206-210 onto LAN 215. Typically, the packet contains two destination addresses: the address of the final destination station 204 and the address of the next station along the route. The final destination address remains constant as the packet traverses the networks, while the next destination address changes as the packet moves from station to station along the route through the networks.
A key function of a router is determining the next station to which the packet is sent; this routing function is preferably performed by network layer (such as internetwork layer 116 of FIG. 1) of a protocol stack within each station. This aspect of the network layer concerns the algorithms and protocols used by routers when cooperating to calculate paths through a network topology. The routers typically execute routing algorithms to decide over which communication links incoming packets should be transmitted.
A type of network layer routing protocol commonly employed by routers is a link state routing protocol. However, conventional link state routing algorithms in conjunction with hop-by-hop forwarding do not generally prevent the creation of temporary forwarding loops during routing transients in a network. In particular, there is a possibility that routers possessing inconsistent routing information in their forwarding databases may forward packets back to a previous sender of the packets during routing transients, thus creating forwarding loops.
In accordance with the present invention, a technique is provided for detecting inconsistencies in FIBs of a router (such router 210) and its neighbor 206 during routing transients in a computer network. As described herein, the neighbor 206 is preferably a next-hop (NH) neighbor as viewed by the router 210 with respect to a particular destination, such as destination station 204. The inventive technique enables the router 210 to detect when its view of a computed path to destination station 204 is inconsistent with the view of its NH neighbor 206 along that path. Upon detecting such an inconsistent state, the router invokes one of a plurality of forwarding mechanisms with respect to a packet intended for the destination station in an attempt to either suppress forwarding loops that may arise during the transients or limit the amount of resources such loops consume.
FIGS. 3 and 6 are flowcharts illustrating the sequence of steps comprising the novel detection technique. In the illustrative embodiment, the technique is embodied as a network layer protocol comprising a control mechanism component 300 and a forwarding mechanism component 600. The control mechanism is based on the ability of each router to compute the shortest path and/or number of hops to a destination station when executing a link state algorithm.
Referring to FIG. 3, the control mechanism sequence 300 starts at Step 302 and proceeds to Step 304 where each router computes a shortest path (route) to the destination 204 by executing a routing algorithm, such as the conventional Dijkstra algorithm. By-products of the Dijkstra algorithm include determinations of parameters such as the next hop, i.e., intermediate router, and the hop-count to the destination, i.e., hop-count (D). In Step 306, the routers install the computed path, together with these parameters, in their FIBs 220.
Each router then constructs an “augmented” FIB (denoted FIB′ 230 in FIG. 2) by manipulating the contents of the FIB 220 to include the next-hop and hop-count (D) parameters (Step 308); these parameters are preferably stored in the FIB′ at a location referenced by an address prefix associated with the path to the destination. The address prefix is that portion of the destination address typically used by network layer protocols performing routing functions (at the same routing level of a network) to make next-hop determinations. The routing information exchanged by (peer) routers typically includes this destination address prefix, although other encoding methods for a set of reachable destinations could be used as well (e.g., explicit enumeration or ranges).
In Step 310, each router checks the FIB′ to determine whether there is a change that affects the hop-count (D) parameter. Although the hop-count typically changes as a result of a change in network topology, not all changes in topology result in a change in hop-count. If there is no change affecting the hop-count (D), each router waits for a change in Step 312 and the sequence loops-back to Step 310; otherwise, if there is a change to the parameter, that router, e.g., NH neighbor 206, generates an update message in Step 314 and transmits that message to all-of its neighbors, including router 210.
FIG. 4 is a schematic diagram of the format of the update message 400 comprising a type field 402 identifying the type of message, an address field 404 of the destination station and a hop-count field 406. Specifically, the latter two fields contain a tuple comprising an address prefix of the destination station (in field 404) and a hop-count (D) [UPDATE] value (in field 406). The hop-count (D) [UPDATE] value in field 406 of the update message 400 represents the number of routers between the router originating the message and the last router within the same routing hierarchy (e.g., OSPF area) as the originating router along the computed path to the destination station (where the path is determined by the originating router).
Upon receiving the update message 400 from the NH neighbor 206, the router 210 (i) either discards all packets intended for the destination that are queued for transmission to the NH neighbor 206, or decrements a time-to-live or lifetime entry of an conventional network layer header of each packet and (ii) acknowledges receipt of the update message by returning an acknowledgement message to the NH neighbor 206 in Step 316. It should be noted that the protocol for exchanging update and acknowledgement messages described herein is built upon a reliable transport mechanism, such as TCP, to ensure reliable exchanges between the router and its neighbor.
FIG. 5 is a schematic block diagram of the format of the acknowledgement message 500 which is substantially similar to the update message 400. That is, the acknowledgement message 500 comprises a type field 502 identifying the type of message, an address field 504 containing the address prefix of the destination station and a hop-count field 506. The contents of the hop-count field 506 comprise a hop-count (D) [ACK] value that is identical to the hop-count (D) [UPDATE] value stored in field 406.
The router 210 then compares the NH view of the computed path, i.e., the hop-count (D) [UPDATE] value contained in the NH neighbor's update message, with its own view, i.e., the hop-count (D) [FIB′] value contained in its FIB′, in Step 318. In accordance with another aspect of the invention, a determination is made as to whether the hop-count (D) [UPDATE] value is less than the hop-count (D) [FIB′] value in Step 320. If so, the router's view of the path is consistent with the NH neighbor's view and the packet may be sent over the path to the destination station in Step 322; the sequence then ends in Step 324. On the other hand, if the update hop-count value (D) is not less than the FIB′ hop-count (D) value (Step 320), the router's view of the computed path is inconsistent with its NH neighbor's view (Step 326) and the forwarding component sequence of the detection technique is invoked.
Referring to FIG. 6, the forwarding sequence 600 starts at Step 602 and proceeds to Step 604 where a forwarding mechanism is selected. Specifically, the packet may be discarded by the router in Step 606; this forces the sender to retransmit the packet because of the underlying reliable transport mechanism. Alternatively, the packet may be forwarded over the path to the destination in Step 610 but only after decrementing a time-to-live or lifetime entry of a conventional network layer header of the packet (Step 608). In either case, the sequence then ends in Step 612. These alternative forwarding mechanisms are preferably invoked by the router for as long as the database inconsistency persists, thus avoiding persistent looping during the transients.
FIGS. 7A-7B are schematic block diagrams of conventional network layer headers that may operate advantageously with the present invention. Specifically, FIG. 7A is a diagram of the Internet protocol (IP) network layer header 700 having a time-to-live field 702 and FIG. 7B is a diagram of the connectionless network layer protocol (CLNP) header 750 having a lifetime field 752. In yet another alternate embodiment, the network layer header may comprise the Internet Packet Exchange (IPX) protocol header having a field similar to the time-to-live field 702. The contents of the fields 702 and 752 are modifiable by the routers; in particular, the contents of these fields are typically set to some initial value by the source station and are thereafter decremented by the routers until they reach zero (0), at which point the packet is discarded. Thus if the packet is caught in a forwarding loop encompassing the routers, the packet will eventually be discarded to suppress the loop.
It should be noted that the router 210 is considered in a transient state (from the point of view of the NH neighbor 206 and destination 204) from the moment at which the NH neighbor 206 installs a new path to the destination in its FIB until the NH neighbor 206 receives and processes an acknowledgement from the router 210 indicating that the update message was received and processed. If the NH neighbor 206 changes its path to the destination station 204, the neighbor discards all packets destined to the destination or decrements a time-to-live or lifetime entry of a network layer header if the packets were received from the router 210 when in a transient state.
When implementing the novel technique it is assumed that there is no re-ordering of packets at the datalink layer of the protocol stack. Moreover, the inventive technique does not ensure that packets do not traverse through a non-shortest path route; the technique only constrains the length (hop-count) of such a route.
An advantage of the inventive technique is that it enables limiting of the amount of resources that could be consumed during routing transients without requiring decrementing time-to-live (hop-count) on every packet. The invention may further operate in an environment where decrementing time-to-live (hop-count) may be undesirable or infeasible.
While there has been shown and described an illustrative embodiment for efficiently detecting inconsistencies in forwarding databases of a router and its NH neighbor during routing transients in a computer network, it is to be understood that various other adaptations and modifications may be made within the spirit and scope of the invention. For-example in an alternate embodiment of the invention, the hop-count parameter contained in the novel update and acknowledgement messages may be substituted with an entire path parameter. Here, the entire path parameter, i.e., path (D), is also a by-product of the Dijkstra algorithm and includes identification (ID) of all routers in the computed path between the either the router and destination or the neighbor and destination.
Furthermore, the comparison operation of Step 318 (FIG. 3) for this alternate embodiment comprises the router 210 comparing the path (D) contents contained in the update message with the path (D) contents contained in its FIB′. A determination is then made as to whether the path (D) of the FIB′ is equal to the path (D) of the update message minus the NH neighbor's ID in Step 320. If so, the router's view of the path is consistent with the NH neighbor's view and the packet may be sent to the destination station in Step 322. Otherwise, the views are inconsistent (Step 324) and the forwarding component sequence 600 (FIG. 6) is invoked.
The foregoing description has been directed to specific embodiments of this invention. It will be apparent, however, that other variations and modifications may be made to the described embodiments, with the attainment of some or all of their advantages. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the invention.
Claims (34)
1. A method for efficiently detecting an inconsistency in a forwarding database of a router during routing transients in a computer network, the method comprising the steps of:
computing a path and a first hop-count parameter to a destination station (hop-count (D)) at the router;
receiving an update message at the router in response to a change in a second hop-count (D) at a next-hop (NH) neighbor, the update message containing an address of the destination station and the second hop-count (D) associated with that address;
comparing the second hop-count (D) with the first hop-count (D) at the router; and
detecting an inconsistency in the forwarding database of the router if the second hop-count (D) is not less than the first hop-count (D).
2. The method of claim 1 further comprising the step of invoking one of a plurality of forwarding options with respect to a packet received at the router and intended for the destination station to suppress forwarding loops during the routing transients.
3. The method of claim 2 wherein the step of invoking one of the forwarding options comprises the step of discarding the packet.
4. The method of claim 2 wherein the step of invoking one of the forwarding options comprises the steps of:
decrementing one of a time-to-live and lifetime entry of a network layer header of the packet; and
forwarding the packet to the destination station over the computed path.
5. The method of claim 4 further comprising the step of: discarding the packet if the time-to-live or lifetime entry has expired.
6. The method of claim 2 wherein the step of invoking one of the forwarding options further comprises the step of forwarding the packet to the destination over the computed path if no inconsistencies are found.
7. The method of claim 1 further comprising the steps of:
constructing an augmented forwarding database at the router; and
storing the first hop-count (D) in the augmented forwarding database.
8. Apparatus for detecting an inconsistency in a view of a path to a destination station of a computer network, the apparatus comprising:
a router coupled to the network, the router having a processing element for processing routing information to compute a path and first hop-count parameter from the router to the destination station;
means, coupled to the router, for executing a control mechanism to determine whether a second hop-count parameter computed by a neighboring router to the destination is less than the first hop-count parameter; and
means, coupled to the router, for invoking a forwarding mechanism with respect to a packet intended for the destination station if the second hop-count parameter is not less than the first hop-count parameter.
9. The apparatus of claim 8 wherein the means for executing the control mechanism further comprises means for comparing the first hop-count parameter with the second hop-count parameter.
10. The apparatus of claim 9 further comprising an augmented forwarding database coupled to the router for storing the first hop-count parameter.
11. The apparatus of claim 10 wherein the means for invoking the forwarding mechanism comprises means for discarding the packet.
12. The apparatus of claim 10 wherein the means for invoking the forwarding mechanism comprises:
means for decrementing one of a time-to-live and lifetime entry of a network layer header of the packet; and
means for forwarding the packet to the destination station over the computed path.
13. A computer readable medium containing executable program instructions for efficiently detecting an inconsistency in a forwarding database of a router during routing transients in a computer network, the executable program instructions comprising program instructions for:
computing a path and a first hop-count parameter to a destination station (hop-count (D)) at the router;
receiving an update message at the router in response to a change in a second hop-count (D) at a next-hop (NH) neighbor, the update message containing an address of the destination station and the second hop-count (D) associated with that address;
comparing the second hop-count (D) with the first hop-count (D) at the router; and
detecting an inconsistency in the forwarding database of the router if the second hop-count (D) is not less than the first hop-count (D).
14. The medium of claim 13 further comprising program instructions for invoking one of a plurality of forwarding options with respect to a packet received at the router and intended for the destination station to suppress forwarding loops during the routing transients.
15. The medium of claim 14 wherein the program instructions for invoking one of the forwarding options comprises program instructions for discarding the packet.
16. The medium of claim 14 wherein the program instructions for invoking one of the forwarding options comprises program instructions for:
decrementing one of a time-to-live and lifetime entry of a network layer header of the packet; and
forwarding the packet to the destination station over the computed path.
17. The medium of claim 13 further comprising program instructions for:
constructing an augmented forwarding database at the router; and
storing the first hop-count (D) in the augmented forwarding database.
18. A method for use in a router having a forwarding database, the method comprising the steps of:
computing a path and a first hop-count to a destination;
receiving a second hop-count to the destination from a next-hop neighbor;
comparing the second hop-count with the first hop-count; and
detecting an inconsistency in the forwarding database if the second hop-count is not less than the first hop-count.
19. The method of claim 18 further comprising: said step of receiving is during routing transients.
20. The method of claim 19 further comprising the step of: invoking one of a plurality of forwarding options with respect to a packet received at the router and intended for the destination to suppress forwarding loops during the routing transients.
21. The method of claim 20 wherein the step of invoking one of the forwarding options further comprises the step of discarding the packet.
22. The method of claim 20 wherein the step of invoking one of the forwarding options further comprises the steps of:
decrementing one of a time-to-live and lifetime entry of a network layer header of the packet; and
forwarding the packet to the destination over the computed path.
23. The method of claim 22 further comprising the step of: discarding the packet if the time-to-live or lifetime entry has expired.
24. The method of claim 20 wherein the step of invoking one of the forwarding options further comprises the step of forwarding the packet to the destination over the computed path if no inconsistencies are found.
25. The method of claim 18 further comprising the steps of:
constructing an augmented forwarding database at the router; and
storing the first hop-count in the augmented forwarding database.
26. A router, comprising:
means for computing a path and a first hop-count to a destination;
means for receiving a second hop-count to the destination from a next-hop neighbor;
means for comparing the second hop-count with the first hop-count; and
means for detecting an inconsistency in the forwarding database if the second hop-count is not less than the first hop-count.
27. A router, comprising:
a processor to compute a path and a first hop-count to a destination;
an input port to receive a second hop-count to the destination from a next-hop neighbor; and
a processor to compare the second hop-count with the first hop-count, and to detect an inconsistency in the forwarding database if the second hop-count is not less than the first hop-count.
28. The router of claim 27 further comprising: a processor to invoke one of a plurality of forwarding options with respect to a packet received at the router and intended for the destination to suppress forwarding loops during routing transients.
29. The router of claim 28 further comprising: wherein one of the plurality of forwarding options is discarding the packet.
30. The router of claim 28 further comprising:
an output port to foward the packet; and
wherein one of the plurality of forwarding options is decrementing one of a time-to-live and lifetime entry of a network layer header of the packet, and forwarding the packet to the destination over the computed path.
31. The router of claim 30 further comprising: wherein one of the plurality of forwarding options is to discard the packet if the time-to-live or lifetime entry has expired.
32. The router of claim 28 further comprising: an output port to forward the packet to the destination over the computed path if no inconsistencies are found.
33. The router of claim 27 further comprising: an augmented forwarding database to store the first-hop count.
34. A computer readable media, comprising: said computer readable media containing instructions for execution in a processor for the practice of the method of claim 1 or claim 18 ).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/360,711 US6597663B1 (en) | 1997-03-03 | 1999-07-26 | Technique for handling forwarding transients with link state routing protocol |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/810,083 US5964841A (en) | 1997-03-03 | 1997-03-03 | Technique for handling forwarding transients with link state routing protocol |
US09/360,711 US6597663B1 (en) | 1997-03-03 | 1999-07-26 | Technique for handling forwarding transients with link state routing protocol |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/810,083 Continuation US5964841A (en) | 1997-03-03 | 1997-03-03 | Technique for handling forwarding transients with link state routing protocol |
Publications (1)
Publication Number | Publication Date |
---|---|
US6597663B1 true US6597663B1 (en) | 2003-07-22 |
Family
ID=25202953
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/810,083 Expired - Lifetime US5964841A (en) | 1997-03-03 | 1997-03-03 | Technique for handling forwarding transients with link state routing protocol |
US09/360,711 Expired - Lifetime US6597663B1 (en) | 1997-03-03 | 1999-07-26 | Technique for handling forwarding transients with link state routing protocol |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/810,083 Expired - Lifetime US5964841A (en) | 1997-03-03 | 1997-03-03 | Technique for handling forwarding transients with link state routing protocol |
Country Status (1)
Country | Link |
---|---|
US (2) | US5964841A (en) |
Cited By (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030014540A1 (en) * | 2001-07-06 | 2003-01-16 | Nortel Networks Limited | Policy-based forwarding in open shortest path first (OSPF) networks |
US20030115283A1 (en) * | 2001-12-13 | 2003-06-19 | Abdulkadev Barbir | Content request routing method |
US20030118053A1 (en) * | 2001-12-26 | 2003-06-26 | Andiamo Systems, Inc. | Methods and apparatus for encapsulating a frame for transmission in a storage area network |
US20030218988A1 (en) * | 2002-05-21 | 2003-11-27 | Min-Ho Han | Network for transferring active packet and method for employing same |
US6731639B1 (en) * | 2000-03-30 | 2004-05-04 | Nortel Networks Limited | Multi protocol label switching for multiple access segments |
US20040100910A1 (en) * | 2002-11-27 | 2004-05-27 | Andiamo Systems, Inc. | Methods and devices for exchanging peer parameters between network devices |
US6820134B1 (en) * | 2000-12-28 | 2004-11-16 | Cisco Technology, Inc. | Optimizing flooding of information in link-state routing protocol |
US6850524B1 (en) * | 2000-07-31 | 2005-02-01 | Gregory Donald Troxel | Systems and methods for predictive routing |
US20050036499A1 (en) * | 2001-12-26 | 2005-02-17 | Andiamo Systems, Inc., A Delaware Corporation | Fibre Channel Switch that enables end devices in different fabrics to communicate with one another while retaining their unique Fibre Channel Domain_IDs |
WO2006015007A2 (en) * | 2004-07-27 | 2006-02-09 | Meshnetworks, Inc. | System and method for detecting transient links in multi-hop wireless networks |
US7006441B1 (en) * | 1999-12-16 | 2006-02-28 | At&T Corp. | Link state network having weighted control message processing |
US7013347B1 (en) * | 2001-10-16 | 2006-03-14 | Cisco Technology, Inc. | Distance vector extension to the address resolution protocol |
US20060087963A1 (en) * | 2004-10-25 | 2006-04-27 | Cisco Technology, Inc. | Graceful port shutdown protocol for fibre channel interfaces |
US20060153186A1 (en) * | 2004-12-29 | 2006-07-13 | Cisco Technology, Inc. | In-order fibre channel packet delivery |
US20070153816A1 (en) * | 2002-06-12 | 2007-07-05 | Cisco Technology, Inc. | Methods and apparatus for characterizing a route in a fibre channel fabric |
US20080008104A1 (en) * | 2006-07-05 | 2008-01-10 | Previdi Stefano B | Technique for efficiently determining acceptable link-based loop free alternates in a computer network |
US7406034B1 (en) * | 2002-04-01 | 2008-07-29 | Cisco Technology, Inc. | Methods and apparatus for fibre channel frame delivery |
US7616637B1 (en) | 2002-04-01 | 2009-11-10 | Cisco Technology, Inc. | Label switching in fibre channel networks |
US7684350B2 (en) | 2006-03-16 | 2010-03-23 | Cisco Technology, Inc. | Method and apparatus for distributing labels in a label distribution protocol multicast network |
US20100290385A1 (en) * | 2009-05-14 | 2010-11-18 | Avaya, Inc. | Preventing packet loops in unified networks |
US20110038257A1 (en) * | 2009-08-11 | 2011-02-17 | Cisco Technology, Inc. | Method and apparatus for sequencing operations for an incoming interface check in data center ethernet |
US7916628B2 (en) | 2004-11-01 | 2011-03-29 | Cisco Technology, Inc. | Trunking for fabric ports in fibre channel switches and attached devices |
US20120069740A1 (en) * | 2010-09-21 | 2012-03-22 | Wenhu Lu | Relayed CSPF Computation for Multiple Areas and Multiple Autonomous Systems |
US8144595B1 (en) * | 2004-03-25 | 2012-03-27 | Verizon Corporate Services Group Inc. | Variable translucency no-sight routing for AD-HOC networks |
US8165146B1 (en) * | 1999-10-28 | 2012-04-24 | Lightwaves Systems Inc. | System and method for storing/caching, searching for, and accessing data |
US20120147808A1 (en) * | 2001-11-28 | 2012-06-14 | Millennial Net, Inc. | Network Protocol |
US8644186B1 (en) | 2008-10-03 | 2014-02-04 | Cisco Technology, Inc. | System and method for detecting loops for routing in a network environment |
US9979615B2 (en) * | 2015-06-05 | 2018-05-22 | Cisco Technology, Inc. | Techniques for determining network topologies |
US10116559B2 (en) | 2015-05-27 | 2018-10-30 | Cisco Technology, Inc. | Operations, administration and management (OAM) in overlay data center environments |
US10171357B2 (en) | 2016-05-27 | 2019-01-01 | Cisco Technology, Inc. | Techniques for managing software defined networking controller in-band communications in a data center network |
US10177977B1 (en) | 2013-02-13 | 2019-01-08 | Cisco Technology, Inc. | Deployment and upgrade of network devices in a network environment |
US10250446B2 (en) | 2017-03-27 | 2019-04-02 | Cisco Technology, Inc. | Distributed policy store |
US10289438B2 (en) | 2016-06-16 | 2019-05-14 | Cisco Technology, Inc. | Techniques for coordination of application components deployed on distributed virtual machines |
US10374904B2 (en) | 2015-05-15 | 2019-08-06 | Cisco Technology, Inc. | Diagnostic network visualization |
US10523541B2 (en) | 2017-10-25 | 2019-12-31 | Cisco Technology, Inc. | Federated network and application data analytics platform |
US10523512B2 (en) | 2017-03-24 | 2019-12-31 | Cisco Technology, Inc. | Network agent for generating platform specific network policies |
US10554501B2 (en) | 2017-10-23 | 2020-02-04 | Cisco Technology, Inc. | Network migration assistant |
US10574575B2 (en) | 2018-01-25 | 2020-02-25 | Cisco Technology, Inc. | Network flow stitching using middle box flow stitching |
US10594542B2 (en) | 2017-10-27 | 2020-03-17 | Cisco Technology, Inc. | System and method for network root cause analysis |
US10594560B2 (en) | 2017-03-27 | 2020-03-17 | Cisco Technology, Inc. | Intent driven network policy platform |
US10613567B2 (en) | 2013-08-06 | 2020-04-07 | Bedrock Automation Platforms Inc. | Secure power supply for an industrial control system |
US10680887B2 (en) | 2017-07-21 | 2020-06-09 | Cisco Technology, Inc. | Remote device status audit and recovery |
US10708183B2 (en) | 2016-07-21 | 2020-07-07 | Cisco Technology, Inc. | System and method of providing segment routing as a service |
US10708152B2 (en) | 2017-03-23 | 2020-07-07 | Cisco Technology, Inc. | Predicting application and network performance |
US10764141B2 (en) | 2017-03-27 | 2020-09-01 | Cisco Technology, Inc. | Network agent for reporting to a network policy system |
US10797970B2 (en) | 2015-06-05 | 2020-10-06 | Cisco Technology, Inc. | Interactive hierarchical network chord diagram for application dependency mapping |
US10798015B2 (en) | 2018-01-25 | 2020-10-06 | Cisco Technology, Inc. | Discovery of middleboxes using traffic flow stitching |
US10826803B2 (en) | 2018-01-25 | 2020-11-03 | Cisco Technology, Inc. | Mechanism for facilitating efficient policy updates |
US10873794B2 (en) | 2017-03-28 | 2020-12-22 | Cisco Technology, Inc. | Flowlet resolution for application performance monitoring and management |
US10873593B2 (en) | 2018-01-25 | 2020-12-22 | Cisco Technology, Inc. | Mechanism for identifying differences between network snapshots |
US10917438B2 (en) | 2018-01-25 | 2021-02-09 | Cisco Technology, Inc. | Secure publishing for policy updates |
US10931629B2 (en) | 2016-05-27 | 2021-02-23 | Cisco Technology, Inc. | Techniques for managing software defined networking controller in-band communications in a data center network |
US10972388B2 (en) | 2016-11-22 | 2021-04-06 | Cisco Technology, Inc. | Federated microburst detection |
US10999149B2 (en) | 2018-01-25 | 2021-05-04 | Cisco Technology, Inc. | Automatic configuration discovery based on traffic flow data |
US11128700B2 (en) | 2018-01-26 | 2021-09-21 | Cisco Technology, Inc. | Load balancing configuration based on traffic flow telemetry |
US11233821B2 (en) | 2018-01-04 | 2022-01-25 | Cisco Technology, Inc. | Network intrusion counter-intelligence |
US11528283B2 (en) | 2015-06-05 | 2022-12-13 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
US20230060363A1 (en) * | 2020-06-17 | 2023-03-02 | Huawei Technologies Co., Ltd. | Packet sending method and device |
US11765046B1 (en) | 2018-01-11 | 2023-09-19 | Cisco Technology, Inc. | Endpoint cluster assignment and query generation |
Families Citing this family (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6252856B1 (en) * | 1996-12-03 | 2001-06-26 | Nortel Networks Limited | Method and apparatus for minimizing calculations required to construct multicast trees |
US5964841A (en) * | 1997-03-03 | 1999-10-12 | Cisco Technology, Inc. | Technique for handling forwarding transients with link state routing protocol |
US6304912B1 (en) | 1997-07-24 | 2001-10-16 | Fujitsu Limited | Process and apparatus for speeding-up layer-2 and layer-3 routing, and for determining layer-2 reachability, through a plurality of subnetworks |
US6061736A (en) * | 1998-03-13 | 2000-05-09 | 3Com Corporation | Routing over similar paths |
US6577634B1 (en) * | 1998-07-01 | 2003-06-10 | Hitachi, Ltd. | Method for sharing network information and a router apparatus |
AU774602B2 (en) * | 1998-12-23 | 2004-07-01 | Nokia Inc. | A unified routing scheme for ad-hoc internetworking |
US6480888B1 (en) * | 1998-12-29 | 2002-11-12 | At&T Corp. | Virtual path concentrator node with loopback |
US6392997B1 (en) * | 1999-03-16 | 2002-05-21 | Cisco Technology, Inc. | Technique for group-based routing update with limited per neighbor/adjacency customization |
US6553402B1 (en) | 1999-05-05 | 2003-04-22 | Nextpage, Inc. | Method for coordinating activities and sharing information using a data definition language |
US6502134B1 (en) * | 1999-05-05 | 2002-12-31 | Nextpage, Inc. | Tuple-based information space for data exchange between applications |
EP1063814A1 (en) * | 1999-06-24 | 2000-12-27 | Alcatel | A method to forward a multicast packet |
US6567380B1 (en) | 1999-06-30 | 2003-05-20 | Cisco Technology, Inc. | Technique for selective routing updates |
US6952421B1 (en) * | 1999-10-07 | 2005-10-04 | Cisco Technology, Inc. | Switched Ethernet path detection |
US6836463B2 (en) * | 1999-10-15 | 2004-12-28 | Nokia Corporation | System for communicating labeled routing trees to establish preferred paths and source routes with local identifiers in wireless computer networks |
US6683865B1 (en) | 1999-10-15 | 2004-01-27 | Nokia Wireless Routers, Inc. | System for routing and switching in computer networks |
US6857026B1 (en) * | 1999-12-14 | 2005-02-15 | Nortel Networks Limited | Using alternate routes for fail-over in a communication network |
US6775258B1 (en) * | 2000-03-17 | 2004-08-10 | Nokia Corporation | Apparatus, and associated method, for routing packet data in an ad hoc, wireless communication system |
US7035223B1 (en) * | 2000-03-23 | 2006-04-25 | Burchfiel Jerry D | Method and apparatus for detecting unreliable or compromised router/switches in link state routing |
US6931444B2 (en) * | 2000-06-12 | 2005-08-16 | Amdocs (Israel) Ltd. | System, method and computer program product for reading, correlating, processing, categorizing and aggregating events of any type |
WO2001099345A2 (en) * | 2000-06-16 | 2001-12-27 | The Regents Of The University Of California | Bandwidth efficient source tracing (best) routing protocol for wireless networks |
US20030107992A1 (en) * | 2000-10-30 | 2003-06-12 | The Regents Of The University Of California | Loop-free multipath routing method using distance vectors |
US6711411B1 (en) | 2000-11-07 | 2004-03-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Management of synchronization network |
US7035202B2 (en) | 2001-03-16 | 2006-04-25 | Juniper Networks, Inc. | Network routing using link failure information |
US6968447B1 (en) * | 2001-04-13 | 2005-11-22 | The United States Of America As Represented By The Secretary Of The Navy | System and method for data forwarding in a programmable multiple network processor environment |
US6950927B1 (en) | 2001-04-13 | 2005-09-27 | The United States Of America As Represented By The Secretary Of The Navy | System and method for instruction-level parallelism in a programmable multiple network processor environment |
US7093160B2 (en) * | 2001-05-03 | 2006-08-15 | Nokia Corporation | Method and system for implementing MPLS redundancy |
US20020176355A1 (en) * | 2001-05-22 | 2002-11-28 | Alan Mimms | Snooping standby router |
US6950427B1 (en) | 2001-08-09 | 2005-09-27 | Cisco Technology, Inc. | Technique for resynchronizing LSDB in OSPF after a software reload in a non-stop forwarding intermediate node of a computer network |
US7076564B2 (en) * | 2001-09-17 | 2006-07-11 | Micromuse Ltd. | Method and apparatus for determining and resolving missing topology features of a network for improved topology accuracy |
US7609689B1 (en) | 2001-09-27 | 2009-10-27 | Cisco Technology, Inc. | System and method for mapping an index into an IPv6 address |
US7639680B1 (en) | 2001-10-04 | 2009-12-29 | Cisco Technology, Inc. | Out of band data base synchronization for OSPF |
US7240123B2 (en) * | 2001-12-10 | 2007-07-03 | Nortel Networks Limited | Distributed routing core |
US20100238935A1 (en) * | 2002-02-25 | 2010-09-23 | Olsonet Communications Corporation | Method for Routing Ad-Hoc Signals |
US7095738B1 (en) * | 2002-05-07 | 2006-08-22 | Cisco Technology, Inc. | System and method for deriving IPv6 scope identifiers and for mapping the identifiers into IPv6 addresses |
US7155632B2 (en) * | 2002-06-27 | 2006-12-26 | Nokia, Inc. | Method and system for implementing IS-IS protocol redundancy |
US8737406B1 (en) | 2002-08-01 | 2014-05-27 | Cisco Technology, Inc. | Method for transmitting IP routes to prioritize convergence |
US7248579B1 (en) | 2002-10-15 | 2007-07-24 | Cisco Technology, Inc. | System and method for providing a link state database (LSDB) snapshot for neighbor synchronization |
US7359945B2 (en) * | 2002-12-05 | 2008-04-15 | Microsoft Corporation | Using conditional statements in electronic messages to prevent overuse of resources or time when delivering the electronic message |
JP4027818B2 (en) * | 2003-02-21 | 2007-12-26 | 株式会社エヌ・ティ・ティ・ドコモ | Multihop communication system, radio control station, radio station, and multihop communication method |
US20040171347A1 (en) * | 2003-02-28 | 2004-09-02 | Burton Joshua W. | Method and system for sending signals over a network with mobile nodes |
US8040886B2 (en) * | 2003-04-08 | 2011-10-18 | Cisco Technology, Inc. | Programmable packet classification system using an array of uniform content-addressable memories |
US7388862B2 (en) * | 2003-06-19 | 2008-06-17 | Cisco Technology, Inc. | Technique for notifying EIGRP neighbors when destroying adjacencies in a computer network |
US7512064B2 (en) * | 2004-06-15 | 2009-03-31 | Cisco Technology, Inc. | Avoiding micro-loop upon failure of fast reroute protected links |
US20050286412A1 (en) * | 2004-06-23 | 2005-12-29 | Lucent Technologies Inc. | Transient notification system |
US7558214B2 (en) | 2004-08-27 | 2009-07-07 | Cisco Technology, Inc. | Mechanism to improve concurrency in execution of routing computation and routing information dissemination |
US7787361B2 (en) | 2005-07-29 | 2010-08-31 | Cisco Technology, Inc. | Hybrid distance vector protocol for wireless mesh networks |
US7660318B2 (en) * | 2005-09-20 | 2010-02-09 | Cisco Technology, Inc. | Internetworking support between a LAN and a wireless mesh network |
US20070110024A1 (en) * | 2005-11-14 | 2007-05-17 | Cisco Technology, Inc. | System and method for spanning tree cross routes |
US9391872B2 (en) | 2011-09-23 | 2016-07-12 | Nectar Services Corp. | Route topology discovery in data networks |
US8750166B2 (en) * | 2011-09-23 | 2014-06-10 | Netsocket, Inc. | Route topology discovery in data networks |
US10438259B1 (en) * | 2013-12-09 | 2019-10-08 | Amazon Technologies, Inc. | Propagating and presenting user specific information |
US9742670B2 (en) * | 2014-03-24 | 2017-08-22 | Cisco Technology, Inc. | Non-eligible distance vector protocol paths as backup paths |
US10410170B1 (en) | 2014-06-18 | 2019-09-10 | Amazon Technologies, Inc. | Propagating and expiring presentation information |
US10200330B2 (en) | 2015-12-10 | 2019-02-05 | Facebook, Inc. | Techniques for ephemeral messaging with a message queue |
US9906480B2 (en) * | 2015-12-10 | 2018-02-27 | Facebook, Inc. | Techniques for ephemeral messaging with legacy clients |
US11071041B1 (en) * | 2020-02-28 | 2021-07-20 | At&T Intellectual Property I, L.P. | Establishing domains of authority for routing table updates between routing devices in a fifth generation (5G) or other next generation network |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0447725A2 (en) | 1990-03-21 | 1991-09-25 | Digital Equipment Corporation | Updating link state information in networks |
US5088032A (en) | 1988-01-29 | 1992-02-11 | Cisco Systems, Inc. | Method and apparatus for routing communications among computer networks |
US5265092A (en) * | 1992-03-18 | 1993-11-23 | Digital Equipment Corporation | Synchronization mechanism for link state packet routing |
US5517620A (en) | 1993-05-19 | 1996-05-14 | Nec Corporation | Dynamic updating of routing information for routing packets between LAN's connected to a plurality of routers via a public network |
US5557745A (en) | 1990-09-04 | 1996-09-17 | Digital Equipment Corporation | Method for supporting foreign protocols across backbone network by combining and transmitting list of destinations that support second protocol in first and second areas to the third area |
US5600794A (en) | 1995-08-04 | 1997-02-04 | Bay Networks, Inc. | Method and apparatus for managing exchange of metrics in a computer network by exchanging only metrics used by a node in the network |
US5754790A (en) | 1996-05-01 | 1998-05-19 | 3Com Corporation | Apparatus and method for selecting improved routing paths in an autonomous system of computer networks |
US5781534A (en) * | 1995-10-31 | 1998-07-14 | Novell, Inc. | Method and apparatus for determining characteristics of a path |
US5790808A (en) | 1995-07-06 | 1998-08-04 | 3 Com | Active topology maintenance in reconfiguring bridged local area networks with state transition with forgetting interval |
US5805593A (en) * | 1995-09-26 | 1998-09-08 | At&T Corp | Routing method for setting up a service between an origination node and a destination node in a connection-communications network |
US5964841A (en) * | 1997-03-03 | 1999-10-12 | Cisco Technology, Inc. | Technique for handling forwarding transients with link state routing protocol |
US6044075A (en) * | 1994-12-15 | 2000-03-28 | International Business Machines Corporation | Apparatus and method for routing a communication in a network |
US6055561A (en) * | 1996-10-02 | 2000-04-25 | International Business Machines Corporation | Mapping of routing traffic to switching networks |
-
1997
- 1997-03-03 US US08/810,083 patent/US5964841A/en not_active Expired - Lifetime
-
1999
- 1999-07-26 US US09/360,711 patent/US6597663B1/en not_active Expired - Lifetime
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5088032A (en) | 1988-01-29 | 1992-02-11 | Cisco Systems, Inc. | Method and apparatus for routing communications among computer networks |
EP0447725A2 (en) | 1990-03-21 | 1991-09-25 | Digital Equipment Corporation | Updating link state information in networks |
US5557745A (en) | 1990-09-04 | 1996-09-17 | Digital Equipment Corporation | Method for supporting foreign protocols across backbone network by combining and transmitting list of destinations that support second protocol in first and second areas to the third area |
US5265092A (en) * | 1992-03-18 | 1993-11-23 | Digital Equipment Corporation | Synchronization mechanism for link state packet routing |
US5517620A (en) | 1993-05-19 | 1996-05-14 | Nec Corporation | Dynamic updating of routing information for routing packets between LAN's connected to a plurality of routers via a public network |
US6044075A (en) * | 1994-12-15 | 2000-03-28 | International Business Machines Corporation | Apparatus and method for routing a communication in a network |
US5790808A (en) | 1995-07-06 | 1998-08-04 | 3 Com | Active topology maintenance in reconfiguring bridged local area networks with state transition with forgetting interval |
US5600794A (en) | 1995-08-04 | 1997-02-04 | Bay Networks, Inc. | Method and apparatus for managing exchange of metrics in a computer network by exchanging only metrics used by a node in the network |
US5805593A (en) * | 1995-09-26 | 1998-09-08 | At&T Corp | Routing method for setting up a service between an origination node and a destination node in a connection-communications network |
US5781534A (en) * | 1995-10-31 | 1998-07-14 | Novell, Inc. | Method and apparatus for determining characteristics of a path |
US5754790A (en) | 1996-05-01 | 1998-05-19 | 3Com Corporation | Apparatus and method for selecting improved routing paths in an autonomous system of computer networks |
US6055561A (en) * | 1996-10-02 | 2000-04-25 | International Business Machines Corporation | Mapping of routing traffic to switching networks |
US6069889A (en) * | 1996-10-02 | 2000-05-30 | International Business Machines Corporation | Aggregation of data flows on switched network paths |
US5964841A (en) * | 1997-03-03 | 1999-10-12 | Cisco Technology, Inc. | Technique for handling forwarding transients with link state routing protocol |
Non-Patent Citations (4)
Title |
---|
Garcia-Luna-Aceves, et al., A Unified Approach to Loop-Free Routing Using Distance Vectors or Link States, Copyright 1989, pp. 212-223. |
Radia Perlman, "Interconnections Bridges and Routers", Addison-Wesley Professional Computing Series, Copyright 1992, pp. 205-231. |
Richard Woundy, et al., ARIS: Internet Draft "Aggregate Route-Based IP Switching", Nov., 1996, 31 pages. |
William Stallings, "Data and Computer Communications", 4th ed., Copyright 1994, pp. 296-312, 488-509. |
Cited By (137)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8542695B1 (en) | 1999-10-28 | 2013-09-24 | Lightwave Systems, Inc. | System and method for storing/caching, searching for, and accessing data |
US9491104B2 (en) | 1999-10-28 | 2016-11-08 | Lightwaves Systems, Inc. | System and method for storing/caching, searching for, and accessing data |
US8165146B1 (en) * | 1999-10-28 | 2012-04-24 | Lightwaves Systems Inc. | System and method for storing/caching, searching for, and accessing data |
US8937967B2 (en) | 1999-10-28 | 2015-01-20 | Lightwaves Systems, Inc. | System and method for storing/caching, searching for, and accessing data |
US7006441B1 (en) * | 1999-12-16 | 2006-02-28 | At&T Corp. | Link state network having weighted control message processing |
US7548514B1 (en) * | 1999-12-16 | 2009-06-16 | At&T Corp | Link state network having weighted control message processing |
US6731639B1 (en) * | 2000-03-30 | 2004-05-04 | Nortel Networks Limited | Multi protocol label switching for multiple access segments |
US6850524B1 (en) * | 2000-07-31 | 2005-02-01 | Gregory Donald Troxel | Systems and methods for predictive routing |
US7437476B2 (en) | 2000-12-28 | 2008-10-14 | Cisco Technology, Inc. | Optimizing flooding of information in link-state routing protocol |
US6820134B1 (en) * | 2000-12-28 | 2004-11-16 | Cisco Technology, Inc. | Optimizing flooding of information in link-state routing protocol |
US20030014540A1 (en) * | 2001-07-06 | 2003-01-16 | Nortel Networks Limited | Policy-based forwarding in open shortest path first (OSPF) networks |
US7831733B2 (en) * | 2001-07-06 | 2010-11-09 | Avaya Holdings Limited | Policy-based forwarding in open shortest path first (OSPF) networks |
US7013347B1 (en) * | 2001-10-16 | 2006-03-14 | Cisco Technology, Inc. | Distance vector extension to the address resolution protocol |
US20120147808A1 (en) * | 2001-11-28 | 2012-06-14 | Millennial Net, Inc. | Network Protocol |
US8429221B2 (en) * | 2001-12-13 | 2013-04-23 | Rockstar Consortium Us Lp | Content request routing method |
US20130218958A1 (en) * | 2001-12-13 | 2013-08-22 | Rockstar Consortium Us Lp | Content request routing method |
US20030115283A1 (en) * | 2001-12-13 | 2003-06-19 | Abdulkadev Barbir | Content request routing method |
US20050036499A1 (en) * | 2001-12-26 | 2005-02-17 | Andiamo Systems, Inc., A Delaware Corporation | Fibre Channel Switch that enables end devices in different fabrics to communicate with one another while retaining their unique Fibre Channel Domain_IDs |
US7599360B2 (en) | 2001-12-26 | 2009-10-06 | Cisco Technology, Inc. | Methods and apparatus for encapsulating a frame for transmission in a storage area network |
US20030118053A1 (en) * | 2001-12-26 | 2003-06-26 | Andiamo Systems, Inc. | Methods and apparatus for encapsulating a frame for transmission in a storage area network |
US7499410B2 (en) | 2001-12-26 | 2009-03-03 | Cisco Technology, Inc. | Fibre channel switch that enables end devices in different fabrics to communicate with one another while retaining their unique fibre channel domain—IDs |
US7616637B1 (en) | 2002-04-01 | 2009-11-10 | Cisco Technology, Inc. | Label switching in fibre channel networks |
US7406034B1 (en) * | 2002-04-01 | 2008-07-29 | Cisco Technology, Inc. | Methods and apparatus for fibre channel frame delivery |
US20100008375A1 (en) * | 2002-04-01 | 2010-01-14 | Cisco Technology, Inc. | Label switching in fibre channel networks |
US8462790B2 (en) | 2002-04-01 | 2013-06-11 | Cisco Technology, Inc. | Label switching in fibre channel networks |
US9350653B2 (en) | 2002-04-01 | 2016-05-24 | Cisco Technology, Inc. | Label switching in fibre channel networks |
US20030218988A1 (en) * | 2002-05-21 | 2003-11-27 | Min-Ho Han | Network for transferring active packet and method for employing same |
US20070153816A1 (en) * | 2002-06-12 | 2007-07-05 | Cisco Technology, Inc. | Methods and apparatus for characterizing a route in a fibre channel fabric |
US7830809B2 (en) | 2002-06-12 | 2010-11-09 | Cisco Technology, Inc. | Methods and apparatus for characterizing a route in a fibre channel fabric |
US7433326B2 (en) | 2002-11-27 | 2008-10-07 | Cisco Technology, Inc. | Methods and devices for exchanging peer parameters between network devices |
US8605624B2 (en) | 2002-11-27 | 2013-12-10 | Cisco Technology, Inc. | Methods and devices for exchanging peer parameters between network devices |
US20040100910A1 (en) * | 2002-11-27 | 2004-05-27 | Andiamo Systems, Inc. | Methods and devices for exchanging peer parameters between network devices |
US7876711B2 (en) | 2003-06-26 | 2011-01-25 | Cisco Technology, Inc. | Fibre channel switch that enables end devices in different fabrics to communicate with one another while retaining their unique fibre channel domain—IDs |
US20110090816A1 (en) * | 2003-06-26 | 2011-04-21 | Cisco Technology, Inc. | FIBRE CHANNEL SWITCH THAT ENABLES END DEVICES IN DIFFERENT FABRICS TO COMMUNICATE WITH ONE ANOTHER WHILE RETAINING THEIR UNIQUE FIBRE CHANNEL DOMAIN_IDs |
US8625460B2 (en) | 2003-06-26 | 2014-01-07 | Cisco Technology, Inc. | Fibre channel switch that enables end devices in different fabrics to communicate with one another while retaining their unique fibre channel domain—IDs |
US9161290B2 (en) | 2004-03-25 | 2015-10-13 | Verizon Patent And Licensing Inc. | Variable translucency no-sight routing for ad-hoc networks |
US8144595B1 (en) * | 2004-03-25 | 2012-03-27 | Verizon Corporate Services Group Inc. | Variable translucency no-sight routing for AD-HOC networks |
WO2006015007A3 (en) * | 2004-07-27 | 2006-05-04 | Meshnetworks Inc | System and method for detecting transient links in multi-hop wireless networks |
WO2006015007A2 (en) * | 2004-07-27 | 2006-02-09 | Meshnetworks, Inc. | System and method for detecting transient links in multi-hop wireless networks |
US20060087963A1 (en) * | 2004-10-25 | 2006-04-27 | Cisco Technology, Inc. | Graceful port shutdown protocol for fibre channel interfaces |
US7593324B2 (en) | 2004-10-25 | 2009-09-22 | Cisco Technology, Inc. | Graceful port shutdown protocol for fibre channel interfaces |
US20110141906A1 (en) * | 2004-11-01 | 2011-06-16 | Cisco Technology, Inc. | Trunking for fabric ports in fibre channel switches and attached devices |
US7916628B2 (en) | 2004-11-01 | 2011-03-29 | Cisco Technology, Inc. | Trunking for fabric ports in fibre channel switches and attached devices |
US8750094B2 (en) | 2004-11-01 | 2014-06-10 | Cisco Technology, Inc. | Trunking for fabric ports in Fibre channel switches and attached devices |
US7649844B2 (en) | 2004-12-29 | 2010-01-19 | Cisco Technology, Inc. | In-order fibre channel packet delivery |
US20060153186A1 (en) * | 2004-12-29 | 2006-07-13 | Cisco Technology, Inc. | In-order fibre channel packet delivery |
US7684350B2 (en) | 2006-03-16 | 2010-03-23 | Cisco Technology, Inc. | Method and apparatus for distributing labels in a label distribution protocol multicast network |
US20080008104A1 (en) * | 2006-07-05 | 2008-01-10 | Previdi Stefano B | Technique for efficiently determining acceptable link-based loop free alternates in a computer network |
US7986640B2 (en) | 2006-07-05 | 2011-07-26 | Cisco Technology, Inc. | Technique for efficiently determining acceptable link-based loop free alternates in a computer network |
US8644186B1 (en) | 2008-10-03 | 2014-02-04 | Cisco Technology, Inc. | System and method for detecting loops for routing in a network environment |
US20100290385A1 (en) * | 2009-05-14 | 2010-11-18 | Avaya, Inc. | Preventing packet loops in unified networks |
US8300614B2 (en) * | 2009-05-14 | 2012-10-30 | Avaya Inc. | Preventing packet loops in unified networks |
US20110038257A1 (en) * | 2009-08-11 | 2011-02-17 | Cisco Technology, Inc. | Method and apparatus for sequencing operations for an incoming interface check in data center ethernet |
US8514876B2 (en) * | 2009-08-11 | 2013-08-20 | Cisco Technology, Inc. | Method and apparatus for sequencing operations for an incoming interface check in data center ethernet |
US8837292B2 (en) * | 2010-09-21 | 2014-09-16 | Telefonaktiebolaget L M Ericsson (Publ) | Relayed CSPF computation for multiple areas and multiple autonomous systems |
US20120069740A1 (en) * | 2010-09-21 | 2012-03-22 | Wenhu Lu | Relayed CSPF Computation for Multiple Areas and Multiple Autonomous Systems |
US10177977B1 (en) | 2013-02-13 | 2019-01-08 | Cisco Technology, Inc. | Deployment and upgrade of network devices in a network environment |
US10613567B2 (en) | 2013-08-06 | 2020-04-07 | Bedrock Automation Platforms Inc. | Secure power supply for an industrial control system |
US10374904B2 (en) | 2015-05-15 | 2019-08-06 | Cisco Technology, Inc. | Diagnostic network visualization |
US10116559B2 (en) | 2015-05-27 | 2018-10-30 | Cisco Technology, Inc. | Operations, administration and management (OAM) in overlay data center environments |
US10326673B2 (en) * | 2015-06-05 | 2019-06-18 | Cisco Technology, Inc. | Techniques for determining network topologies |
US11695659B2 (en) | 2015-06-05 | 2023-07-04 | Cisco Technology, Inc. | Unique ID generation for sensors |
US11102093B2 (en) | 2015-06-05 | 2021-08-24 | Cisco Technology, Inc. | System and method of assigning reputation scores to hosts |
US10181987B2 (en) | 2015-06-05 | 2019-01-15 | Cisco Technology, Inc. | High availability of collectors of traffic reported by network sensors |
US11936663B2 (en) | 2015-06-05 | 2024-03-19 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
US11252058B2 (en) | 2015-06-05 | 2022-02-15 | Cisco Technology, Inc. | System and method for user optimized application dependency mapping |
US10320630B2 (en) | 2015-06-05 | 2019-06-11 | Cisco Technology, Inc. | Hierarchichal sharding of flows from sensors to collectors |
US10171319B2 (en) | 2015-06-05 | 2019-01-01 | Cisco Technology, Inc. | Technologies for annotating process and user information for network flows |
US10009240B2 (en) | 2015-06-05 | 2018-06-26 | Cisco Technology, Inc. | System and method of recommending policies that result in particular reputation scores for hosts |
US10439904B2 (en) | 2015-06-05 | 2019-10-08 | Cisco Technology, Inc. | System and method of determining malicious processes |
US10505828B2 (en) | 2015-06-05 | 2019-12-10 | Cisco Technology, Inc. | Technologies for managing compromised sensors in virtualized environments |
US10516586B2 (en) | 2015-06-05 | 2019-12-24 | Cisco Technology, Inc. | Identifying bogon address spaces |
US10516585B2 (en) | 2015-06-05 | 2019-12-24 | Cisco Technology, Inc. | System and method for network information mapping and displaying |
US11924072B2 (en) | 2015-06-05 | 2024-03-05 | Cisco Technology, Inc. | Technologies for annotating process and user information for network flows |
US11924073B2 (en) | 2015-06-05 | 2024-03-05 | Cisco Technology, Inc. | System and method of assigning reputation scores to hosts |
US11902120B2 (en) | 2015-06-05 | 2024-02-13 | Cisco Technology, Inc. | Synthetic data for determining health of a network security system |
US10567247B2 (en) | 2015-06-05 | 2020-02-18 | Cisco Technology, Inc. | Intra-datacenter attack detection |
US11902122B2 (en) | 2015-06-05 | 2024-02-13 | Cisco Technology, Inc. | Application monitoring prioritization |
US11894996B2 (en) | 2015-06-05 | 2024-02-06 | Cisco Technology, Inc. | Technologies for annotating process and user information for network flows |
US11700190B2 (en) | 2015-06-05 | 2023-07-11 | Cisco Technology, Inc. | Technologies for annotating process and user information for network flows |
US9979615B2 (en) * | 2015-06-05 | 2018-05-22 | Cisco Technology, Inc. | Techniques for determining network topologies |
US11153184B2 (en) | 2015-06-05 | 2021-10-19 | Cisco Technology, Inc. | Technologies for annotating process and user information for network flows |
US10693749B2 (en) | 2015-06-05 | 2020-06-23 | Cisco Technology, Inc. | Synthetic data for determining health of a network security system |
US11252060B2 (en) | 2015-06-05 | 2022-02-15 | Cisco Technology, Inc. | Data center traffic analytics synchronization |
US11637762B2 (en) | 2015-06-05 | 2023-04-25 | Cisco Technology, Inc. | MDL-based clustering for dependency mapping |
US10728119B2 (en) | 2015-06-05 | 2020-07-28 | Cisco Technology, Inc. | Cluster discovery via multi-domain fusion for application dependency mapping |
US10735283B2 (en) | 2015-06-05 | 2020-08-04 | Cisco Technology, Inc. | Unique ID generation for sensors |
US10742529B2 (en) | 2015-06-05 | 2020-08-11 | Cisco Technology, Inc. | Hierarchichal sharding of flows from sensors to collectors |
US10979322B2 (en) | 2015-06-05 | 2021-04-13 | Cisco Technology, Inc. | Techniques for determining network anomalies in data center networks |
US10797970B2 (en) | 2015-06-05 | 2020-10-06 | Cisco Technology, Inc. | Interactive hierarchical network chord diagram for application dependency mapping |
US11528283B2 (en) | 2015-06-05 | 2022-12-13 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
US11522775B2 (en) | 2015-06-05 | 2022-12-06 | Cisco Technology, Inc. | Application monitoring prioritization |
US10862776B2 (en) | 2015-06-05 | 2020-12-08 | Cisco Technology, Inc. | System and method of spoof detection |
US11502922B2 (en) | 2015-06-05 | 2022-11-15 | Cisco Technology, Inc. | Technologies for managing compromised sensors in virtualized environments |
US11477097B2 (en) | 2015-06-05 | 2022-10-18 | Cisco Technology, Inc. | Hierarchichal sharding of flows from sensors to collectors |
US11405291B2 (en) | 2015-06-05 | 2022-08-02 | Cisco Technology, Inc. | Generate a communication graph using an application dependency mapping (ADM) pipeline |
US11368378B2 (en) | 2015-06-05 | 2022-06-21 | Cisco Technology, Inc. | Identifying bogon address spaces |
US10177998B2 (en) | 2015-06-05 | 2019-01-08 | Cisco Technology, Inc. | Augmenting flow data for improved network monitoring and management |
US10931629B2 (en) | 2016-05-27 | 2021-02-23 | Cisco Technology, Inc. | Techniques for managing software defined networking controller in-band communications in a data center network |
US11546288B2 (en) | 2016-05-27 | 2023-01-03 | Cisco Technology, Inc. | Techniques for managing software defined networking controller in-band communications in a data center network |
US10171357B2 (en) | 2016-05-27 | 2019-01-01 | Cisco Technology, Inc. | Techniques for managing software defined networking controller in-band communications in a data center network |
US10289438B2 (en) | 2016-06-16 | 2019-05-14 | Cisco Technology, Inc. | Techniques for coordination of application components deployed on distributed virtual machines |
US11283712B2 (en) | 2016-07-21 | 2022-03-22 | Cisco Technology, Inc. | System and method of providing segment routing as a service |
US10708183B2 (en) | 2016-07-21 | 2020-07-07 | Cisco Technology, Inc. | System and method of providing segment routing as a service |
US10972388B2 (en) | 2016-11-22 | 2021-04-06 | Cisco Technology, Inc. | Federated microburst detection |
US10708152B2 (en) | 2017-03-23 | 2020-07-07 | Cisco Technology, Inc. | Predicting application and network performance |
US11088929B2 (en) | 2017-03-23 | 2021-08-10 | Cisco Technology, Inc. | Predicting application and network performance |
US11252038B2 (en) | 2017-03-24 | 2022-02-15 | Cisco Technology, Inc. | Network agent for generating platform specific network policies |
US10523512B2 (en) | 2017-03-24 | 2019-12-31 | Cisco Technology, Inc. | Network agent for generating platform specific network policies |
US11509535B2 (en) | 2017-03-27 | 2022-11-22 | Cisco Technology, Inc. | Network agent for reporting to a network policy system |
US10764141B2 (en) | 2017-03-27 | 2020-09-01 | Cisco Technology, Inc. | Network agent for reporting to a network policy system |
US11146454B2 (en) | 2017-03-27 | 2021-10-12 | Cisco Technology, Inc. | Intent driven network policy platform |
US10250446B2 (en) | 2017-03-27 | 2019-04-02 | Cisco Technology, Inc. | Distributed policy store |
US10594560B2 (en) | 2017-03-27 | 2020-03-17 | Cisco Technology, Inc. | Intent driven network policy platform |
US10873794B2 (en) | 2017-03-28 | 2020-12-22 | Cisco Technology, Inc. | Flowlet resolution for application performance monitoring and management |
US11863921B2 (en) | 2017-03-28 | 2024-01-02 | Cisco Technology, Inc. | Application performance monitoring and management platform with anomalous flowlet resolution |
US11202132B2 (en) | 2017-03-28 | 2021-12-14 | Cisco Technology, Inc. | Application performance monitoring and management platform with anomalous flowlet resolution |
US11683618B2 (en) | 2017-03-28 | 2023-06-20 | Cisco Technology, Inc. | Application performance monitoring and management platform with anomalous flowlet resolution |
US10680887B2 (en) | 2017-07-21 | 2020-06-09 | Cisco Technology, Inc. | Remote device status audit and recovery |
US11044170B2 (en) | 2017-10-23 | 2021-06-22 | Cisco Technology, Inc. | Network migration assistant |
US10554501B2 (en) | 2017-10-23 | 2020-02-04 | Cisco Technology, Inc. | Network migration assistant |
US10523541B2 (en) | 2017-10-25 | 2019-12-31 | Cisco Technology, Inc. | Federated network and application data analytics platform |
US10904071B2 (en) | 2017-10-27 | 2021-01-26 | Cisco Technology, Inc. | System and method for network root cause analysis |
US10594542B2 (en) | 2017-10-27 | 2020-03-17 | Cisco Technology, Inc. | System and method for network root cause analysis |
US11750653B2 (en) | 2018-01-04 | 2023-09-05 | Cisco Technology, Inc. | Network intrusion counter-intelligence |
US11233821B2 (en) | 2018-01-04 | 2022-01-25 | Cisco Technology, Inc. | Network intrusion counter-intelligence |
US11765046B1 (en) | 2018-01-11 | 2023-09-19 | Cisco Technology, Inc. | Endpoint cluster assignment and query generation |
US10873593B2 (en) | 2018-01-25 | 2020-12-22 | Cisco Technology, Inc. | Mechanism for identifying differences between network snapshots |
US10917438B2 (en) | 2018-01-25 | 2021-02-09 | Cisco Technology, Inc. | Secure publishing for policy updates |
US10999149B2 (en) | 2018-01-25 | 2021-05-04 | Cisco Technology, Inc. | Automatic configuration discovery based on traffic flow data |
US10574575B2 (en) | 2018-01-25 | 2020-02-25 | Cisco Technology, Inc. | Network flow stitching using middle box flow stitching |
US10826803B2 (en) | 2018-01-25 | 2020-11-03 | Cisco Technology, Inc. | Mechanism for facilitating efficient policy updates |
US11924240B2 (en) | 2018-01-25 | 2024-03-05 | Cisco Technology, Inc. | Mechanism for identifying differences between network snapshots |
US10798015B2 (en) | 2018-01-25 | 2020-10-06 | Cisco Technology, Inc. | Discovery of middleboxes using traffic flow stitching |
US11128700B2 (en) | 2018-01-26 | 2021-09-21 | Cisco Technology, Inc. | Load balancing configuration based on traffic flow telemetry |
US20230060363A1 (en) * | 2020-06-17 | 2023-03-02 | Huawei Technologies Co., Ltd. | Packet sending method and device |
US11882022B2 (en) * | 2020-06-17 | 2024-01-23 | Huawei Technologies Co., Ltd. | Packet sending method and device |
Also Published As
Publication number | Publication date |
---|---|
US5964841A (en) | 1999-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6597663B1 (en) | Technique for handling forwarding transients with link state routing protocol | |
Albrightson et al. | EIGRP--A fast routing protocol based on distance vectors | |
US6567380B1 (en) | Technique for selective routing updates | |
US7924726B2 (en) | Arrangement for preventing count-to-infinity in flooding distance vector routing protocols | |
US6683874B1 (en) | Router device and label switched path control method using upstream initiated aggregation | |
US8467394B2 (en) | Automatic route tagging of BGP next-hop routes in IGP | |
Godfrey et al. | Pathlet routing | |
US6633544B1 (en) | Efficient precomputation of quality-of-service routes | |
US8572225B2 (en) | Technique for graceful shutdown of a routing protocol in a network | |
US6392997B1 (en) | Technique for group-based routing update with limited per neighbor/adjacency customization | |
Chen et al. | An efficient multipath forwarding method | |
US7466655B1 (en) | Ant-based method for discovering a network path that satisfies a quality of service equipment | |
Nelakuditi et al. | Failure insensitive routing for ensuring service availability | |
US20060045024A1 (en) | Mechanism to improve concurrency in execution of routing computation and routing information dissemination | |
US20070127367A1 (en) | Communication system and communication method | |
US9350684B2 (en) | Packet network routing | |
KR20030085016A (en) | Method and aparatus for priority-based load balancing for use in an extended local area network | |
US6721899B1 (en) | Fault-tolerant non-flooding routing | |
US11277328B1 (en) | Using anycast as an abstract next hop (ANH) to reduce information related to border gateway protocl (BGP) next hops received by autonomous system border routers (ASBRs) and/or to improve BGP path convergence | |
US11558282B2 (en) | System and method for interior gateway protocol (IGP) fast convergence | |
US8018953B1 (en) | Adaptive, deterministic ant routing approach for updating network routing information | |
Narváez et al. | Local restoration algorithm for link-state routing protocols | |
Hussein et al. | Routing Information Protocol (RIP) for wired network | |
Chen et al. | A simple, practical distributed multi-path routing algorithm | |
Schmid et al. | Avoiding counting to infinity in distance vector routing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FPAY | Fee payment |
Year of fee payment: 12 |